{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T21:22:12Z","timestamp":1775856132632,"version":"3.50.1"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T00:00:00Z","timestamp":1707955200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T00:00:00Z","timestamp":1707955200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["SN COMPUT. SCI."],"DOI":"10.1007\/s42979-023-02584-5","type":"journal-article","created":{"date-parts":[[2024,2,15]],"date-time":"2024-02-15T11:02:34Z","timestamp":1707994954000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["DyClust: A Hybrid Key Management Scheme for Wireless Sensor Network"],"prefix":"10.1007","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0856-7138","authenticated-orcid":false,"given":"Gunjan","family":"Srivastava","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J. N.","family":"Singh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Manisha","family":"Manjul","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aditi","family":"Paul","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,2,15]]},"reference":[{"key":"2584_CR1","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1016\/j.procs.2017.12.028","volume":"125","author":"P Ahlawat","year":"2018","unstructured":"Ahlawat P, Dave M. An attack model based highly secure key management scheme for wireless sensor networks. Procedia Comput Sci. 2018;125:201\u20137.","journal-title":"Procedia Comput Sci"},{"issue":"4","key":"2584_CR2","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"IF Akyildiz","year":"2002","unstructured":"Akyildiz IF, Su W, Sankarasubramaniam Y, Cayirci E. Wireless sensor networks: a survey. Comput Netw. 2002;38(4):393\u2013422.","journal-title":"Comput Netw"},{"issue":"2","key":"2584_CR3","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.jnca.2009.10.001","volume":"33","author":"J Zhang","year":"2010","unstructured":"Zhang J, Varadharajan V. Wireless sensor network key management survey and taxonomy. J Netw Comput Appl. 2010;33(2):63\u201375.","journal-title":"J Netw Comput Appl"},{"key":"2584_CR4","doi-asserted-by":"crossref","unstructured":"Johnson D, Hu YC, Maltz D. The dynamic source routing protocol (DSR) for mobile ad hoc networks for IPv4. RFC, 4728. 2007. pp 1\u2013107.","DOI":"10.17487\/rfc4728"},{"key":"2584_CR5","doi-asserted-by":"crossref","unstructured":"Perkins C, Belding-Royer E, Das S. RFC3561: Ad hoc on-demand distance vector (AODV) routing. USA: RFC Editor; 2003.","DOI":"10.17487\/rfc3561"},{"key":"2584_CR6","doi-asserted-by":"crossref","unstructured":"Shen AN, Guo S, Chien HY. An efficient and scalable key distribution mechanism for hierarchical wireless sensor networks. In: 2009 IEEE Sarnoff symposium, Princeton, NJ. IEEE; 2009. p. 1\u20135.","DOI":"10.1109\/SARNOF.2009.4850313"},{"key":"2584_CR7","doi-asserted-by":"publisher","unstructured":"Kumar KN, Nene MJ. Chip-based symmetric and asymmetric key generation in hierarchical wireless sensors networks. In: 2017 International conference on inventive systems and control (ICISC), Coimbatore, India. IEEE; 2017. p. 1\u20136. https:\/\/doi.org\/10.1109\/ICISC.2017.8068646.","DOI":"10.1109\/ICISC.2017.8068646"},{"issue":"4","key":"2584_CR8","doi-asserted-by":"publisher","first-page":"670","DOI":"10.3390\/s17040670","volume":"17","author":"Z Mahmood","year":"2017","unstructured":"Mahmood Z, Ning H, Ghafoor A. A polynomial subset-based efficient multi-party key management system for lightweight device networks. Sensors. 2017;17(4):670.","journal-title":"Sensors"},{"key":"2584_CR9","doi-asserted-by":"crossref","unstructured":"Dinker AG, Sharma V. Trivariate polynomial based key management scheme (TPB-KMS) in hierarchical wireless sensor networks. In: Ambient communications and computer systems: RACCCS 2017. Singapore: Springer; 2018. p. 283\u201390.","DOI":"10.1007\/978-981-10-7386-1_25"},{"issue":"22","key":"2584_CR10","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4776","volume":"31","author":"PN Bahrami","year":"2019","unstructured":"Bahrami PN, Javadi HH, Dargahi T, Dehghantanha A, Choo KKR. A hierarchical key pre-distribution scheme for fog networks. Concurr Comput: Pract Exp. 2019;31(22): e4776.","journal-title":"Concurr Comput: Pract Exp"},{"key":"2584_CR11","doi-asserted-by":"publisher","unstructured":"Albakri A, Maddumala M, Harn L. Hierarchical polynomial-based key management scheme in fog computing. In: 2018 17th IEEE international conference on trust, security and privacy in computing and communications\/12th IEEE international conference on big data science and engineering (TrustCom\/BigDataSE), New York, NY, USA. IEEE; 2018. p. 1593\u20137. https:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00231.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00231"},{"key":"2584_CR12","doi-asserted-by":"crossref","unstructured":"Hamsha K, Nagaraja GS. Threshold cryptography based light weight key management technique for hierarchical WSNs. In: Ubiquitous communications and network computing: second EAI international conference, Bangalore, India, February 8\u201310, 2019, proceedings 2. Berlin: Springer International Publishing; 2019. p. 188\u201397.","DOI":"10.1007\/978-3-030-20615-4_14"},{"issue":"7","key":"2584_CR13","doi-asserted-by":"publisher","first-page":"892","DOI":"10.1049\/iet-com.2018.5258","volume":"13","author":"A Kumar","year":"2019","unstructured":"Kumar A, Bansal N, Pais AR. New key pre-distribution scheme based on combinatorial design for wireless sensor networks. IET Commun. 2019;13(7):892\u20137.","journal-title":"IET Commun"},{"key":"2584_CR14","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1016\/j.jnca.2016.01.012","volume":"63","author":"M Ge","year":"2016","unstructured":"Ge M, Choo KKR, Wu H, Yu Y. Survey on key revocation mechanisms in wireless sensor networks. J Netw Comput Appl. 2016;63:24\u201338.","journal-title":"J Netw Comput Appl"},{"issue":"1","key":"2584_CR15","doi-asserted-by":"publisher","first-page":"5108","DOI":"10.48084\/etasr.3213","volume":"10","author":"MB Apsara","year":"2020","unstructured":"Apsara MB, Dayananda P, Sowmyarani CN. A review on secure group key management schemes for data gathering in wireless sensor networks. Eng Technol Appl Sci Res. 2020;10(1):5108\u201312.","journal-title":"Eng Technol Appl Sci Res"},{"issue":"10","key":"2584_CR16","doi-asserted-by":"publisher","first-page":"6055","DOI":"10.3390\/app13106055","volume":"13","author":"A Albakri","year":"2023","unstructured":"Albakri A, Alshahrani R, Alharbi F, Ahamed SB. Fully homomorphic encryption with optimal key generation secure group communication in Internet of Things environment. Appl Sci. 2023;13(10):6055.","journal-title":"Appl Sci"},{"issue":"4","key":"2584_CR17","doi-asserted-by":"publisher","first-page":"477","DOI":"10.3844\/jcssp.2013.477.487","volume":"9","author":"SK Muthusamy","year":"2013","unstructured":"Muthusamy SK, Thiyagarajan P, Selvaraj L. An enhanced and cost effective group key management scheme for multicast network. J Comput Sci. 2013;9(4):477.","journal-title":"J Comput Sci"},{"key":"2584_CR18","doi-asserted-by":"publisher","first-page":"1325","DOI":"10.1007\/s12652-019-01449-1","volume":"11","author":"V Srivastava","year":"2020","unstructured":"Srivastava V, Tripathi S, Singh K, Son LH. Energy efficient optimized rate based congestion control routing in wireless sensor network. J Ambient Intell Humaniz Comput. 2020;11:1325\u201338.","journal-title":"J Ambient Intell Humaniz Comput"}],"container-title":["SN Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02584-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s42979-023-02584-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s42979-023-02584-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T13:21:24Z","timestamp":1731331284000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s42979-023-02584-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,15]]},"references-count":18,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["2584"],"URL":"https:\/\/doi.org\/10.1007\/s42979-023-02584-5","relation":{},"ISSN":["2661-8907"],"issn-type":[{"value":"2661-8907","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,15]]},"assertion":[{"value":"26 September 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 December 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they do not have any conflict of interests. This manuscript has not been submitted to, nor is under review at, another journal or other publishing venue.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}}],"article-number":"269"}}